2️⃣Comparison Tables

A Comprehensive Analysis of 4P Email & Chat in Contrast to Existing Web2 & Web3 Communication Platforms.

4P Email vs. Web2 Competitors

Attribute4P EmailGmailProton MailYahoo Mail

Model

Decentralized

Centralized

Centralized

Centralized

Decentralized Storage

🚫

🚫

🚫

End-to-End (E2E) Encryption

🚫

🚫

Self-Custodial E2E Encryption

🚫

🚫

🚫

Permissionless Access

🚫

🚫

🚫

Immutable Communication & Data

🚫

🚫

🚫

Communication & Data Portability

✅🚫

🚫

🚫

Self-Custodial Open-source Application

🚫

🚫

🚫

dID self-custody

🚫

🚫

🚫

No Data-Ownership Loss

🚫

🚫

🚫

No Data Mining

🚫

🚫

🚫

De-platforming Resistant

🚫

🚫

🚫

4P Chat vs. Web2 Competitors

Attribute4P ChatTelegramWhatsAppFacebook Messenger

Model

Decentralized

Centralized

Centralized

Centralized

Decentralized Storage

🚫

🚫

🚫

DM & Group E2E Encryption

✅🚫

🚫

Self-Custodial E2E Encryption

🚫

🚫

🚫

Permissionless Access

🚫

🚫

🚫

Immutable Communication

🚫

🚫

🚫

Communication & Data Portability

🚫

🚫

🚫

Self-Custodial Open-source Application

🚫

🚫

🚫

dID self-custody

🚫

🚫

🚫

No Data-Ownership Loss

🚫

🚫

🚫

No Data Mining

🚫

🚫

🚫

De-platforming Resistant

🚫

🚫

🚫

Explanation:

  • Model: Web2 legacy communication platforms may currently excel in speed and ease of access, but its centralized model has not proven reliable and sustainable in the long run. 4P sources its security from underlying decentralized blockchain networks enabling communication permissionless, immutability and self-custody, while preventing data ownership loss.

  • Decentralized Storage: Existing legacy communication platforms use centralized databases which are vulnerable to potential security breaches, data loss, and single points of failure. 4P utilises decentralized storage instead of a centralised database, which empowers users with data self-custody and prevents security breaches.

  • Self-Custodial E2E Encryption: End-to-end encryption has also become present within legacy communication platforms. The only problem is that users don't control the encryption keys. By owning encryption keys, 4P enables users to take control over their communication encryption in a true self-custodial way.

  • Permissionless Access: In comparison to permisioned legacy communication applications, 4P allows users to onboard permissionally without any approvals.

  • Immutable Communication: Due to its unique 1 email/message = 1 L1/L2 transaction model, the 4P emails and messages are immutable, enhancing communication transparency and trust.

  • Communication & Data Portability: Compared to siloed legacy communication applications, the emails, messages and accompanying data within the 4P system are portable. 4P application acts only as a conduit enabling communication interaction.

  • Self-Custodial Open-source Application: Existing legacy communication applications are custodial by nature, meaning they control, manage and own your communication data while granting access permissions and managing communication encryption keys. As a complete opposite, the 4P application works in a true self-custodial way. Communication is executed on public blockchains where only users can access and decrypt it using their private keys. In the case of the 4P downtime, anyone can spin up and run their open-source app client and access their email or chat communication data.

  • dID Self-Custody: Legacy communication applications own user handles, which in fact act as user digital identity. In the case of 4P, the user wallet acts as dID, making digital identity truly self-custodial and within the user's control.

  • No Data-Ownership Loss: By utilising self-custodial decentralized storage NFTs, 4P enables users to retain data ownership, ensuring they retain full control over their communication data. Access to communication data is possible only with the user's private key!

  • Data Mining: Data mining has become the core revenue driver behind existing legacy communication platforms. Due to the 4P's decentralized and self-custodial design, the users are in complete control over their data. No data ownership is lost or data mined in the process.

  • De-platforming Resistant Protocol: Due to its permissioned model, many de-platforming use cases are happening in legacy communication applications. The modular, self-custodial design and communication data portability excludes de-platforming as a concept.

4P Email vs. Web3 Competitors

Attribute4P EmailEthermailDmailMailChainLedgerMail

Decentralization Coefficient

= L1/L2

TBD

TBD

TBD

TBD

Wallet Login

🚫

🚫

Public On-chain Communication

🚫

🚫

🚫

E2E Encryption

Self-custodial E2E Encryption

🚫

🚫

🚫

🚫

Immutable Communication & Data

🚫

TBD

TBD

Communication & Data Portability

TBD

🚫

TBD

🚫

Decentralized Storage

🚫

🚫

Self-custodial Decentralized Storage

🚫

TBD

🚫

🚫

Self-Custodial Open-source Application

🚫

TBD

🚫

Multi-chain Deployment

🚫

🚫

No Data Mining

TBD

TBD

TBD

TBD

De-platforming Resistant

TBD

TBD

TBD

🚫

White-label Availability

🚫

🚫

🚫

🚫

4P Chat vs. Web3 Competitors

Attribute4P ChatPush ChatDechatXMTP Chat

Decentralization Coefficient

= L1/L2

TBD

TBD

TBD

Wallet login

🚫

Public On-Chain Communication

🚫

🚫

🚫

Group Chat

🚫

E2E Encryption

E2E Group Chat E2E Encryption

TBD

🚫

Self-Custodial E2E Encryption

🚫

🚫

🚫

Immutable Communication

TBD

🚫

TBD

Communication & Data Portability

TBD

🚫

Decentralized Storage

🚫

TBD

Self-custodial Decentralized Storage

🚫

🚫

TBD

Self-Custodial Open-source Application

🚫

Multi-Chain Deployment

🚫

TBD

No Data Mining

TBD

TBD

TBD

De-platforming Resistant

TBD

TBD

White-Label Availability

TBD

🚫

Explanation:

  • Decentralization Coefficient: Compared to many Web3 competitors, 4P has no long roadmap to decentralization, nor does it take any shortcuts. Due to its unique on-chain “1 email/message = 1 L1/L2 transaction” model 4Ps decentralization coefficient is directly correlated to the decentralization of the underlying public blockchain network.

  • W2W Login: In most cases, users don't own their email address, which is owned by the email platform. On the other hand, users do own their wallet address, which enables permissionless 4P login access with no phone number required.

  • Public On-Chain Communication: In the case of 4P, one email or message is represented as one L1 or L2 transaction, while data files and bigger objects are stored on decentralized storage. This model enables "true" decentralized communication that is non-custodial, permissionless, immutable, and Web2 data mining-resistant therefore the complete opposite of the legacy off-chain centralized communication that we use every day.

  • Group Chat: 4P enables the creation of chat groups where messages in the form of L1/L2 transactions are executed via public blockchains. Depending on the E2E encryption utilisation the groups can be private or public.

  • Self-Custodial E2E Encryption: Encryptor Extension adds the communication end-to-end encryption layer within 4P Super App currently unsupported in major wallets. It enables user encryption self-custody not available before in any digital communication.

  • E2E Group Chat E2E Encryption: Developing the framework for on-chain end-to-end encryption group messaging was a challenge. Solved by the OCC SDK by the random generation of the secret key, that is used to encrypt/decrypt messages. The secret key is distributed to all group members and separately encrypted with AES over the ECDH key agreement protocol.

  • Immutable Communication: Due to its unique 1 email/message = 1 L1/L2 transaction model, the 4P emails and messages are immutable, enhancing communication transparency and trust.

  • Communication & Data Portability: Compared to siloed communication applications, the emails, messages and accompanying data within the 4P system are portable. 4P application acts only as a conduit enabling communication interaction.

  • Self-Custodial Open-source Application: Communication is executed on public blockchains where only users can access it and decrypt it using their private keys. In the case of the 4P downtime, anyone can spin up their open-source dMail or dChat application and access their communication data.

  • Decentralized Storage: 4P utilises self-custodial decentralized storage via PollinationX. Programmed with predetermined storage capacity, the PollinationX Storage NFT or short PX sNFT represents the decentralized storage unit (e.g. 100MB, 5GB, 10GB, 20GB, 100GB) and enables users to mint the storage according to specific needs in a true self-custodial manner.

  • Multi-Chain: 4P multi-chain support allows it to be usable across various public EVM blockchains, providing flexibility and choice.

  • Data Mining: Data mining has become the core revenue driver behind many communication platforms. Due to the 4P's decentralized and self-custodial design, the users are in complete control over their data. No data ownership is lost or data mined in the process.

  • De-platforming Resistant Protocol: The modular, self-custodial design and communication data portability excludes de-platforming as a concept.

  • White-Label: The 4P application is open-source so anyone can fork it. It will also be available as plug & play white label shortly.

Disclaimer: The research data was collected to the best of our ability and understanding. In the case of incorrect data, please submit a correction.

Last updated